Hi Haiyang,
[I'm resuming this work by Andres. Sorry for the delay.]
> > switch (nvsp_packet->hdr.msg_type) {
> > case NVSP_MSG_TYPE_INIT_COMPLETE:
> > case NVSP_MSG1_TYPE_SEND_RECV_BUF_COMPLETE:
> > case NVSP_MSG1_TYPE_SEND_SEND_BUF_COMPLETE:
> > case NVSP_MSG5_TYPE_SUBCHAN
> -Original Message-
> From: Andres Beltran
> Sent: Tuesday, July 28, 2020 6:53 PM
> To: KY Srinivasan ; Haiyang Zhang
> ; Stephen Hemminger ;
> wei@kernel.org
> Cc: linux-hyp...@vger.kernel.org; linux-ker...@vger.kernel.org; Michael
> Kelley ; parri.and...@gmail.com; Saruhan
> Kara
From: Andres Beltran
Date: Tue, 28 Jul 2020 18:53:21 -0400
> For additional robustness in the face of Hyper-V errors or malicious
> behavior, validate all values that originate from packets that Hyper-V
> has sent to the guest in the host-to-guest ring buffer. Ensure that
> invalid values cannot